fix
This commit is contained in:
@@ -149,7 +149,7 @@ func (iam *IdentityAccessManagement) doesSignatureMatch(hashedPayload string, r
|
|||||||
}
|
}
|
||||||
|
|
||||||
if forwardedPrefix := r.Header.Get("X-Forwarded-Prefix"); forwardedPrefix != "" {
|
if forwardedPrefix := r.Header.Get("X-Forwarded-Prefix"); forwardedPrefix != "" {
|
||||||
// Handling usage of reverse proxy at prefix. Note that it's an undefined behavior for AWS S3 and not supported in MinIO.
|
// Handling usage of reverse proxy at prefix.
|
||||||
// Trying with prefix before main path.
|
// Trying with prefix before main path.
|
||||||
|
|
||||||
// Get canonical request.
|
// Get canonical request.
|
||||||
@@ -686,7 +686,6 @@ func extractSignedHeaders(signedHeaders []string, r *http.Request) (http.Header,
|
|||||||
case "host":
|
case "host":
|
||||||
// Go http server removes "host" from Request.Header
|
// Go http server removes "host" from Request.Header
|
||||||
if forwardedHost := r.Header.Get("X-Forwarded-Host"); forwardedHost != "" {
|
if forwardedHost := r.Header.Get("X-Forwarded-Host"); forwardedHost != "" {
|
||||||
// Trying to use reverse proxy at prefix. Note that it's an undefined behavior for AWS S3 and not supported in MinIO.
|
|
||||||
extractedSignedHeaders.Set(header, forwardedHost)
|
extractedSignedHeaders.Set(header, forwardedHost)
|
||||||
} else if forwardedFor := r.Header.Get("X-Forwarded-For"); forwardedFor != "" {
|
} else if forwardedFor := r.Header.Get("X-Forwarded-For"); forwardedFor != "" {
|
||||||
extractedSignedHeaders.Set(header, forwardedFor)
|
extractedSignedHeaders.Set(header, forwardedFor)
|
||||||
|
|||||||
@@ -315,6 +315,6 @@ func errInvalidArgument(message string) error {
|
|||||||
StatusCode: http.StatusBadRequest,
|
StatusCode: http.StatusBadRequest,
|
||||||
Code: "InvalidArgument",
|
Code: "InvalidArgument",
|
||||||
Message: message,
|
Message: message,
|
||||||
RequestID: "minio",
|
RequestID: "client",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user